Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jdm/jdm14.bht:"
@article{DBLP:journals/jdm/AllenM03, author = {Gove N. Allen and Salvatore T. March}, title = {Modeling Temporal Dynamics for Business Systems}, journal = {J. Database Manag.}, volume = {14}, number = {3}, pages = {21--36}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003070102}, doi = {10.4018/JDM.2003070102}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/AllenM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/BaeKH03, author = {Kyoung{-}Il Bae and Jung{-}Hyun Kim and Soon{-}Young Huh}, title = {Federated Process Framework in a Virtual Enterprise Using an Object-oriented Database and Extensible Markup Language}, journal = {J. Database Manag.}, volume = {14}, number = {1}, pages = {27--47}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003010102}, doi = {10.4018/JDM.2003010102}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/BaeKH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/BajajR03, author = {Akhilesh Bajaj and Sudha Ram}, title = {{IAIS:} {A} Methodology to Enable Inter-Agency Information Sharing In eGovernment}, journal = {J. Database Manag.}, volume = {14}, number = {4}, pages = {59--80}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003100104}, doi = {10.4018/JDM.2003100104}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/BajajR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/BaskervilleP03, author = {Richard L. Baskerville and Victor Portougal}, title = {A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection}, journal = {J. Database Manag.}, volume = {14}, number = {2}, pages = {1--13}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003040101}, doi = {10.4018/JDM.2003040101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/BaskervilleP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/DahanayakeSS03, author = {A. N. W. Dahanayake and Henk G. Sol and Zoran Stojanovic}, title = {Methodology Evaluation Framework for Component-Based System Development}, journal = {J. Database Manag.}, volume = {14}, number = {1}, pages = {1--26}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003010101}, doi = {10.4018/JDM.2003010101}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/DahanayakeSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/LloydPLY03, author = {Scott J. Lloyd and Joan Peckham and Jian Li and Qing Yang}, title = {{RORIB:} An Economic and Efficient Solution for Real-Time Online Remote Info Backup}, journal = {J. Database Manag.}, volume = {14}, number = {3}, pages = {56--73}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003070104}, doi = {10.4018/JDM.2003070104}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/LloydPLY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/NicolleYS03, author = {Christophe Nicolle and Kokou Y{\'{e}}tongnon and Jean{-}Claude Simon}, title = {{XML} Integration and Toolkit for {B2B} Applications}, journal = {J. Database Manag.}, volume = {14}, number = {4}, pages = {33--58}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003100103}, doi = {10.4018/JDM.2003100103}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/NicolleYS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/PatnaikP03, author = {Satyadeep Patnaik and Brajendra Panda}, title = {Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks}, journal = {J. Database Manag.}, volume = {14}, number = {2}, pages = {27--41}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003040103}, doi = {10.4018/JDM.2003040103}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/PatnaikP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/PonsA03, author = {Alexander Perez{-}Pons and Hassan Aljifri}, title = {Data Protection Using Watermarking in E-Business}, journal = {J. Database Manag.}, volume = {14}, number = {4}, pages = {1--13}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003100101}, doi = {10.4018/JDM.2003100101}, timestamp = {Fri, 11 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdm/PonsA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/ReidD03, author = {Randal Reid and Gurpreet Dhillon}, title = {Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications}, journal = {J. Database Manag.}, volume = {14}, number = {2}, pages = {42--51}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003040104}, doi = {10.4018/JDM.2003040104}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/ReidD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/SelonenKS03, author = {Petri Selonen and Kai Koskimies and Markku Sakkinen}, title = {Transformation Between {UML} Diagrams}, journal = {J. Database Manag.}, volume = {14}, number = {3}, pages = {37--55}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003070103}, doi = {10.4018/JDM.2003070103}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdm/SelonenKS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/ShankaranarayanZW03, author = {G. Shankaranarayan and Mostapha Ziad and Richard Y. Wang}, title = {Managing Data Quality in Dynamic Decision Environments: An Information Product Approach}, journal = {J. Database Manag.}, volume = {14}, number = {4}, pages = {14--32}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003100102}, doi = {10.4018/JDM.2003100102}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/ShankaranarayanZW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/SujitparapitayaJG03, author = {Sutee Sujitparapitaya and Brian D. Janz and Mark Lee Gillenson}, title = {The Contribution of {IT} Governance Solutions to the Implementation of Data Warehouse Practice}, journal = {J. Database Manag.}, volume = {14}, number = {2}, pages = {52--69}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003040105}, doi = {10.4018/JDM.2003040105}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/SujitparapitayaJG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/Weber03, author = {Ron Weber}, title = {Conceptual Modeling and Ontology: Possibilities and Pitfalls}, journal = {J. Database Manag.}, volume = {14}, number = {3}, pages = {1--20}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003070101}, doi = {10.4018/JDM.2003070101}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/Weber03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/WeipplEKS03, author = {Edgar R. Weippl and Wolfgang E{\ss}mayr and Ludwig Klug}, title = {A New Approach To Secure Federated Information Bases Using Agent Technology}, journal = {J. Database Manag.}, volume = {14}, number = {1}, pages = {48--68}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003010103}, doi = {10.4018/JDM.2003010103}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/WeipplEKS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/WilsonR03, author = {Rick L. Wilson and Peter A. Rosen}, title = {Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases}, journal = {J. Database Manag.}, volume = {14}, number = {2}, pages = {14--26}, year = {2003}, url = {https://doi.org/10.4018/jdm.2003040102}, doi = {10.4018/JDM.2003040102}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/WilsonR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.